Sciweavers

478 search results - page 69 / 96
» Privacy and pricing personal information
Sort
View
CSREASAM
2010
13 years 6 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj
ACSAC
2006
IEEE
14 years 2 months ago
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine
Performing sensitive online transactions using computers found in cybercaf´es and public libraries is risky. The untrusted nature of these machines creates a target rich environm...
Ravi Chandra Jammalamadaka, Timothy W. van der Hor...
ESORICS
2010
Springer
13 years 6 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
SDMW
2010
Springer
13 years 6 months ago
Computationally Efficient Searchable Symmetric Encryption
Searchable encryption is a technique that allows a client to store documents on a server in encrypted form. Stored documents can be retrieved selectively while revealing as little ...
Peter van Liesdonk, Saeed Sedghi, Jeroen Doumen, P...
CHI
2005
ACM
14 years 9 months ago
Location disclosure to social relations: why, when, & what people want to share
Advances in location-enhanced technology are making it easier for us to be located by others. These new technologies present a difficult privacy tradeoff, as disclosing one's...
Sunny Consolvo, Ian E. Smith, Tara Matthews, Antho...